8.4 KiB
Sprint: SPRINT_20260117_029_Runbook_coverage_expansion
Task: RUN-002 - Crypto Subsystem Runbook
Regional Crypto Operations Runbook
Status: PRODUCTION-READY (2026-01-17 UTC)
Scope
Cryptographic subsystem operations including HSM management, regional crypto profile configuration, key rotation, and certificate management for all supported crypto profiles (International, FIPS, eIDAS, GOST, SM).
Pre-flight Checklist
Environment Verification
# Check crypto subsystem health
stella doctor --category crypto
# Verify active crypto profile
stella crypto profile show
# List loaded crypto providers
stella crypto providers list
# Check key status
stella crypto keys status
Metrics to Watch
stella_crypto_operations_total- Crypto operation count by typestella_crypto_operation_duration_seconds- Signing/verification latencystella_hsm_availability- HSM availability (if configured)stella_cert_expiry_days- Certificate expiration countdown
Regional Crypto Profiles
Profile Overview
| Profile | Use Case | Key Algorithms | Compliance |
|---|---|---|---|
international |
Default, most deployments | RSA-2048+, ECDSA P-256/P-384, Ed25519 | General |
fips |
US Government / FedRAMP | FIPS 140-2 approved algorithms only | FIPS 140-2 |
eidas |
European Union | RSA-PSS, ECDSA, Ed25519 per ETSI TS 119 312 | eIDAS |
gost |
Russian Federation | GOST R 34.10-2012, GOST R 34.11-2012 | Russian standards |
sm |
China | SM2, SM3, SM4 | GM/T 0003-2012 |
Switching Profiles
-
Pre-switch verification:
# Verify target profile is available stella crypto profile verify --profile <target-profile> # Check for incompatible existing signatures stella crypto audit --check-compatibility --target-profile <target-profile> -
Profile switch:
# Switch profile (requires service restart) stella crypto profile set --profile <target-profile> # Restart services to apply stella service restart --graceful -
Post-switch verification:
stella doctor --check check.crypto.fips,check.crypto.eidas,check.crypto.gost,check.crypto.sm
Standard Procedures
SP-001: Key Rotation
Frequency: Quarterly or per policy Duration: ~15 minutes (no downtime)
-
Generate new key:
# For software keys stella crypto keys generate --type signing --algorithm ecdsa-p256 --name signing-$(date +%Y%m) # For HSM-backed keys stella crypto keys generate --type signing --algorithm ecdsa-p256 --provider hsm --name signing-$(date +%Y%m) -
Activate new key:
stella crypto keys activate --name signing-$(date +%Y%m) -
Verify signing with new key:
echo "test" | stella crypto sign --output /dev/null -
Schedule old key deactivation:
stella crypto keys schedule-deactivation --name <old-key-name> --in 30d
SP-002: Certificate Renewal
When: Certificate expiring within 30 days
-
Check expiration:
stella crypto certs check-expiry -
Generate CSR:
stella crypto certs csr --subject "CN=stellaops.example.com,O=Example Corp" --output cert.csr -
Install renewed certificate:
stella crypto certs install --cert renewed-cert.pem --chain ca-chain.pem -
Verify certificate chain:
stella doctor --check check.crypto.certchain -
Restart services:
stella service restart --graceful
SP-003: HSM Health Check
Frequency: Daily (automated) or on-demand
-
Check HSM connectivity:
stella crypto hsm status -
Verify slot access:
stella crypto hsm slots list -
Test signing operation:
stella crypto hsm test-sign -
Check HSM metrics:
- Free objects/sessions
- Temperature/health (vendor-specific)
Incident Procedures
INC-001: HSM Unavailable
Symptoms:
- Alert:
StellaHsmUnavailable - Signing operations failing with "HSM connection error"
Investigation:
# Check HSM status
stella crypto hsm status
# Test PKCS#11 module
stella crypto hsm test-module
# Check network to HSM
stella network test --host <hsm-host> --port <hsm-port>
Resolution:
-
Network issue:
- Verify network path to HSM
- Check firewall rules
- Verify HSM appliance is powered on
-
Session exhaustion:
# Release stale sessions stella crypto hsm sessions release --stale # Restart crypto service stella service restart --service crypto-signer -
HSM failure:
- Fail over to secondary HSM (if configured)
- Contact HSM vendor support
- Consider temporary fallback to software keys (with approval)
INC-002: Signing Key Compromised
CRITICAL - Follow incident response procedure
-
Immediate containment:
# Revoke compromised key stella crypto keys revoke --name <compromised-key> --reason compromise # Block signing with compromised key stella crypto keys block --name <compromised-key> -
Generate replacement key:
stella crypto keys generate --type signing --algorithm ecdsa-p256 --name emergency-signing stella crypto keys activate --name emergency-signing -
Notify downstream:
- Update trust registries with new key
- Notify relying parties
- Publish key revocation notice
-
Forensics:
# Export key usage audit log stella crypto audit export --key <compromised-key> --output /secure/key-audit.json
INC-003: Certificate Expired
Symptoms:
- TLS connection failures
- Alert:
StellaCertExpired
Immediate Resolution:
-
If renewed certificate is available:
stella crypto certs install --cert renewed-cert.pem --chain ca-chain.pem stella service restart --graceful -
If renewal not ready - emergency self-signed (temporary):
# Generate emergency certificate (NOT for production use) stella crypto certs generate-self-signed --days 7 --name emergency stella crypto certs install --cert emergency.pem stella service restart --graceful -
Expedite certificate renewal process
INC-004: FIPS Mode Not Enabled
Symptoms:
- Alert:
StellaFipsNotEnabled - Compliance audit failure
Resolution:
-
Linux:
# Enable FIPS mode sudo fips-mode-setup --enable # Reboot required sudo reboot # Verify after reboot fips-mode-setup --check -
Windows:
- Enable via Group Policy
- Or via registry:
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Lsa\FipsAlgorithmPolicy" -Name "Enabled" -Value 1 Restart-Computer
-
Restart Stella services:
stella service restart stella doctor --check check.crypto.fips
Regional-Specific Procedures
GOST Configuration (Russian Federation)
-
Install GOST engine:
sudo apt install libengine-gost-openssl1.1 -
Configure Stella:
stella crypto profile set --profile gost stella crypto config set --gost-engine-path /usr/lib/x86_64-linux-gnu/engines-3/gost.so -
Verify:
stella doctor --check check.crypto.gost
SM Configuration (China)
-
Ensure OpenSSL 1.1.1+ with SM support:
openssl version openssl list -cipher-algorithms | grep -i sm -
Configure Stella:
stella crypto profile set --profile sm -
Verify:
stella doctor --check check.crypto.sm
Monitoring Dashboard
Access: Grafana → Dashboards → Stella Ops → Crypto Subsystem
Key panels:
- Signing operation latency
- Key usage by key ID
- HSM availability
- Certificate expiration countdown
- Crypto profile in use
Evidence Capture
# Comprehensive crypto diagnostics
stella crypto diagnostics --output /tmp/crypto-diag-$(date +%Y%m%dT%H%M%S).tar.gz
Bundle includes:
- Active crypto profile
- Key inventory (public keys only)
- Certificate chain
- HSM status
- Operation audit log (last 24h)
Escalation Path
- L1 (On-call): Certificate installs, key activation
- L2 (Security team): Key rotation, HSM issues
- L3 (Crypto SME): Algorithm issues, compliance questions
- HSM Vendor: Hardware failures
Last updated: 2026-01-17 (UTC)